"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-05-28 20:02:20 +00:00
parent bfb57e66b9
commit 82a79d5c62
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
100 changed files with 2013 additions and 152 deletions

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-1e70cc10feda"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-c298863b1525"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -199,6 +199,6 @@
]
},
"generator": {
"engine": "bippy-851b3ed3d212"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -156,6 +156,6 @@
]
},
"generator": {
"engine": "bippy-5f0117140d9a"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -135,6 +135,6 @@
]
},
"generator": {
"engine": "bippy-851b3ed3d212"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -183,6 +183,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -130,6 +130,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -109,6 +109,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -131,6 +131,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,168 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47309",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: validate lwtstate->data before returning from skb_tunnel_info()\n\nskb_tunnel_info() returns pointer of lwtstate->data as ip_tunnel_info\ntype without validation. lwtstate->data can have various types such as\nmpls_iptunnel_encap, etc and these are not compatible.\nSo skb_tunnel_info() should validate before returning that pointer.\n\nSplat looks like:\nBUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan]\nRead of size 2 at addr ffff888106ec2698 by task ping/811\n\nCPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195\nCall Trace:\n dump_stack_lvl+0x56/0x7b\n print_address_description.constprop.8.cold.13+0x13/0x2ee\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n kasan_report.cold.14+0x83/0xdf\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n vxlan_get_route+0x418/0x4b0 [vxlan]\n [ ... ]\n vxlan_xmit_one+0x148b/0x32b0 [vxlan]\n [ ... ]\n vxlan_xmit+0x25c5/0x4780 [vxlan]\n [ ... ]\n dev_hard_start_xmit+0x1ae/0x6e0\n __dev_queue_xmit+0x1f39/0x31a0\n [ ... ]\n neigh_xmit+0x2f9/0x940\n mpls_xmit+0x911/0x1600 [mpls_iptunnel]\n lwtunnel_xmit+0x18f/0x450\n ip_finish_output2+0x867/0x2040\n [ ... ]"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "61adedf3e3f1",
"version_value": "e7f3c9df4051"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.3",
"status": "affected"
},
{
"version": "0",
"lessThan": "4.3",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.4.277",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.277",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.241",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.199",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.135",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.53",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.5",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/e7f3c9df40515a6c6b46f36c4c94cf48a043f887",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e7f3c9df40515a6c6b46f36c4c94cf48a043f887"
},
{
"url": "https://git.kernel.org/stable/c/b61d327cd3cc5ea591f3bf751dd11e034f388bb5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b61d327cd3cc5ea591f3bf751dd11e034f388bb5"
},
{
"url": "https://git.kernel.org/stable/c/83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d"
},
{
"url": "https://git.kernel.org/stable/c/8bb1589c89e61e3b182dd546f1021928ebb5c2a6",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8bb1589c89e61e3b182dd546f1021928ebb5c2a6"
},
{
"url": "https://git.kernel.org/stable/c/8aa13a86964cdec4fd969ef677c6614ff068641a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8aa13a86964cdec4fd969ef677c6614ff068641a"
},
{
"url": "https://git.kernel.org/stable/c/2179d96ec702cc33ead02a9ce40ece599b8538c5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2179d96ec702cc33ead02a9ce40ece599b8538c5"
},
{
"url": "https://git.kernel.org/stable/c/a915379594f1e045421635c6316d8f3ffa018c58",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a915379594f1e045421635c6316d8f3ffa018c58"
},
{
"url": "https://git.kernel.org/stable/c/67a9c94317402b826fc3db32afc8f39336803d97",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/67a9c94317402b826fc3db32afc8f39336803d97"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,168 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47310",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: fix UAF in tlan_remove_one\n\npriv is netdev private data and it cannot be\nused after free_netdev() call. Using priv after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1e0a8b13d355",
"version_value": "a18a8d9cfbb1"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "3.10",
"status": "affected"
},
{
"version": "0",
"lessThan": "3.10",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.4.277",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.277",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.241",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.199",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.135",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.53",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.5",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf"
},
{
"url": "https://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6"
},
{
"url": "https://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9"
},
{
"url": "https://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193"
},
{
"url": "https://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1"
},
{
"url": "https://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405"
},
{
"url": "https://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342"
},
{
"url": "https://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,157 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47311",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "54e19bc74f33",
"version_value": "4d04a42b926e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.9",
"status": "affected"
},
{
"version": "0",
"lessThan": "4.9",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.277",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.241",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.199",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.135",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.53",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.5",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/4d04a42b926e682140776e54188f4a44f1f01a81",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4d04a42b926e682140776e54188f4a44f1f01a81"
},
{
"url": "https://git.kernel.org/stable/c/b1e091331920f8fbfc747dcbd16263fcd71abb2d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b1e091331920f8fbfc747dcbd16263fcd71abb2d"
},
{
"url": "https://git.kernel.org/stable/c/11e9d163d631198bb3eb41a677a61b499516c0f7",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/11e9d163d631198bb3eb41a677a61b499516c0f7"
},
{
"url": "https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c"
},
{
"url": "https://git.kernel.org/stable/c/b560521eca03d0a2db6093a5a632cbdd0a0cf833",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b560521eca03d0a2db6093a5a632cbdd0a0cf833"
},
{
"url": "https://git.kernel.org/stable/c/8a225a6e07a57a1538d53637cb3d82bd3e477839",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8a225a6e07a57a1538d53637cb3d82bd3e477839"
},
{
"url": "https://git.kernel.org/stable/c/ad297cd2db8953e2202970e9504cab247b6c7cb4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ad297cd2db8953e2202970e9504cab247b6c7cb4"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,82 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47312",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: Fix dereference of null pointer flow\n\nIn the case where chain->flags & NFT_CHAIN_HW_OFFLOAD is false then\nnft_flow_rule_create is not called and flow is NULL. The subsequent\nerror handling execution via label err_destroy_flow_rule will lead\nto a null pointer dereference on flow when calling nft_flow_rule_destroy.\nSince the error path to err_destroy_flow_rule has to cater for null\nand non-null flows, only call nft_flow_rule_destroy if flow is non-null\nto fix this issue.\n\nAddresses-Coverity: (\"Explicity null dereference\")"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "09b1f676e2e0",
"version_value": "70a5a1950cca"
},
{
"version_affected": "<",
"version_name": "3c5e44622011",
"version_value": "4ca041f919f1"
},
{
"version_affected": "<",
"version_name": "5.13.2",
"version_value": "5.13.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/70a5a1950cca02c5cd161bb3846b4d983eed97d3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/70a5a1950cca02c5cd161bb3846b4d983eed97d3"
},
{
"url": "https://git.kernel.org/stable/c/4ca041f919f13783b0b03894783deee00dbca19a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4ca041f919f13783b0b03894783deee00dbca19a"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,113 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47313",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init\n\nIt's a classic example of memleak, we allocate something, we fail and\nnever free the resources.\n\nMake sure we free all resources on policy ->init() failures."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "a28b2bfc099c",
"version_value": "b77538335575"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.11",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.11",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/b775383355755885b19d2acef977f1ca132e80a3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b775383355755885b19d2acef977f1ca132e80a3"
},
{
"url": "https://git.kernel.org/stable/c/e1b2b2b61d30d7ce057ec17237c217d152ed97f2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/e1b2b2b61d30d7ce057ec17237c217d152ed97f2"
},
{
"url": "https://git.kernel.org/stable/c/fe2535a44904a77615a3af8e8fd7dafb98fb0e1b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/fe2535a44904a77615a3af8e8fd7dafb98fb0e1b"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,179 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47314",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of private memory on probe failure\n\nOn probe error the driver should free the memory allocated for private\nstructure. Fix this by using resource-managed allocation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "a20cbdeffce2",
"version_value": "801847675606"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "3.3",
"status": "affected"
},
{
"version": "0",
"lessThan": "3.3",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad"
},
{
"url": "https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4"
},
{
"url": "https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f"
},
{
"url": "https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6"
},
{
"url": "https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5"
},
{
"url": "https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f"
},
{
"url": "https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0"
},
{
"url": "https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0"
},
{
"url": "https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,190 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47315",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmemory: fsl_ifc: fix leak of IO mapping on probe failure\n\nOn probe error the driver should unmap the IO memory. Smatch reports:\n\n drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: 'fsl_ifc_ctrl_dev->gregs' not released on lines: 298."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "a20cbdeffce2",
"version_value": "b7a2bcb4a373"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "3.3",
"status": "affected"
},
{
"version": "0",
"lessThan": "3.3",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.4.277",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/b7a2bcb4a3731d68f938207f75ed3e1d41774510",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b7a2bcb4a3731d68f938207f75ed3e1d41774510"
},
{
"url": "https://git.kernel.org/stable/c/bd051b3e184fa56eeb6276ee913ba4d48069024b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/bd051b3e184fa56eeb6276ee913ba4d48069024b"
},
{
"url": "https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955"
},
{
"url": "https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b"
},
{
"url": "https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f"
},
{
"url": "https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf"
},
{
"url": "https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27"
},
{
"url": "https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a"
},
{
"url": "https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1"
},
{
"url": "https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,102 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47316",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: fix NULL dereference in nfs3svc_encode_getaclres\n\nIn error cases the dentry may be NULL.\n\nBefore 20798dfe249a, the encoder also checked dentry and\nd_really_is_positive(dentry), but that looks like overkill to me--zero\nstatus should be enough to guarantee a positive dentry.\n\nThis isn't the first time we've seen an error-case NULL dereference\nhidden in the initialization of a local variable in an xdr encoder. But\nI went back through the other recent rewrites and didn't spot any\nsimilar bugs."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "20798dfe249a",
"version_value": "650e6f383a6e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.13",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.13",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/650e6f383a6eb40f7c0a010982a74ab4b6893870",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/650e6f383a6eb40f7c0a010982a74ab4b6893870"
},
{
"url": "https://git.kernel.org/stable/c/ab1016d39cc052064e32f25ad18ef8767a0ee3b8",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ab1016d39cc052064e32f25ad18ef8767a0ee3b8"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,113 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47317",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/bpf: Fix detecting BPF atomic instructions\n\nCommit 91c960b0056672 (\"bpf: Rename BPF_XADD and prepare to encode other\natomics in .imm\") converted BPF_XADD to BPF_ATOMIC and added a way to\ndistinguish instructions based on the immediate field. Existing JIT\nimplementations were updated to check for the immediate field and to\nreject programs utilizing anything more than BPF_ADD (such as BPF_FETCH)\nin the immediate field.\n\nHowever, the check added to powerpc64 JIT did not look at the correct\nBPF instruction. Due to this, such programs would be accepted and\nincorrectly JIT'ed resulting in soft lockups, as seen with the atomic\nbounds test. Fix this by looking at the correct immediate value."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "91c960b00566",
"version_value": "7284dab07e4d"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.12",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.12",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/7284dab07e4d51d453cc42851fae9ec4fac6ef2f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7284dab07e4d51d453cc42851fae9ec4fac6ef2f"
},
{
"url": "https://git.kernel.org/stable/c/0d435b6d94b05dcfd836d758a63145aa566618e2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0d435b6d94b05dcfd836d758a63145aa566618e2"
},
{
"url": "https://git.kernel.org/stable/c/419ac821766cbdb9fd85872bb3f1a589df05c94c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/419ac821766cbdb9fd85872bb3f1a589df05c94c"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,102 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47318",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\narch_topology: Avoid use-after-free for scale_freq_data\n\nCurrently topology_scale_freq_tick() (which gets called from\nscheduler_tick()) may end up using a pointer to \"struct\nscale_freq_data\", which was previously cleared by\ntopology_clear_scale_freq_source(), as there is no protection in place\nhere. The users of topology_clear_scale_freq_source() though needs a\nguarantee that the previously cleared scale_freq_data isn't used\nanymore, so they can free the related resources.\n\nSince topology_scale_freq_tick() is called from scheduler tick, we don't\nwant to add locking in there. Use the RCU update mechanism instead\n(which is already used by the scheduler's utilization update path) to\nguarantee race free updates here.\n\nsynchronize_rcu() makes sure that all RCU critical sections that started\nbefore it is called, will finish before it returns. And so the callers\nof topology_clear_scale_freq_source() don't need to worry about their\ncallback getting called anymore."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "01e055c120a4",
"version_value": "ccdf7e073170"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.13",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.13",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/ccdf7e073170886bc370c613e269de610a794c4a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ccdf7e073170886bc370c613e269de610a794c4a"
},
{
"url": "https://git.kernel.org/stable/c/83150f5d05f065fb5c12c612f119015cabdcc124",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/83150f5d05f065fb5c12c612f119015cabdcc124"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,169 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47319",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: Fix memory leak among suspend/resume procedure\n\nThe vblk->vqs should be freed before we call init_vqs()\nin virtblk_restore()."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "381bde79d11e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a"
},
{
"url": "https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c"
},
{
"url": "https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815"
},
{
"url": "https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f"
},
{
"url": "https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358"
},
{
"url": "https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0"
},
{
"url": "https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae"
},
{
"url": "https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710"
},
{
"url": "https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,179 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47320",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfs: fix acl memory leak of posix_acl_create()\n\nWhen looking into another nfs xfstests report, I found acl and\ndefault_acl in nfs3_proc_create() and nfs3_proc_mknod() error\npaths are possibly leaked. Fix them in advance."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "013cdf1088d7",
"version_value": "2e3960f276b4"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "3.14",
"status": "affected"
},
{
"version": "0",
"lessThan": "3.14",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2"
},
{
"url": "https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b"
},
{
"url": "https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883"
},
{
"url": "https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529"
},
{
"url": "https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357"
},
{
"url": "https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4"
},
{
"url": "https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38"
},
{
"url": "https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2"
},
{
"url": "https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,169 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47321",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwatchdog: Fix possible use-after-free by calling del_timer_sync()\n\nThis driver's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1da177e4c3f4",
"version_value": "58606882ad8e"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "4.4.276",
"lessThanOrEqual": "4.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.9.276",
"lessThanOrEqual": "4.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.14.240",
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "4.19.198",
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.4.134",
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d"
},
{
"url": "https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f"
},
{
"url": "https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270"
},
{
"url": "https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a"
},
{
"url": "https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111"
},
{
"url": "https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4"
},
{
"url": "https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e"
},
{
"url": "https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3"
},
{
"url": "https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,18 +1,124 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-47322",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cve@kernel.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT\n\nFix an Oopsable condition in pnfs_mark_request_commit() when we're\nputting a set of writes on the commit list to reschedule them after a\nfailed pNFS attempt."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Linux",
"product": {
"product_data": [
{
"product_name": "Linux",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "9c455a8c1e14",
"version_value": "5c7ef8a37055"
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "5.7",
"status": "affected"
},
{
"version": "0",
"lessThan": "5.7",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.52",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.12.19",
"lessThanOrEqual": "5.12.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.13.4",
"lessThanOrEqual": "5.13.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.14",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://git.kernel.org/stable/c/5c7ef8a3705542136a1e19b070e951f0730b2153",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/5c7ef8a3705542136a1e19b070e951f0730b2153"
},
{
"url": "https://git.kernel.org/stable/c/7c96a2ee45be41d5a167e6332d202086752c36bb",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7c96a2ee45be41d5a167e6332d202086752c36bb"
},
{
"url": "https://git.kernel.org/stable/c/7aec9f862411906f8c27071ba65a1e110ad7d2fd",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/7aec9f862411906f8c27071ba65a1e110ad7d2fd"
},
{
"url": "https://git.kernel.org/stable/c/3731d44bba8e0116b052b1b374476c5f6dd9a456",
"refsource": "MISC",
"name": "https://git.kernel.org/stable/c/3731d44bba8e0116b052b1b374476c5f6dd9a456"
}
]
},
"generator": {
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -131,6 +131,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -142,6 +142,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -87,6 +87,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -113,6 +113,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -107,6 +107,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -108,6 +108,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -97,6 +97,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -163,6 +163,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -119,6 +119,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -153,6 +153,6 @@
]
},
"generator": {
"engine": "bippy-5e66918c8507"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-d175d3acf727"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -98,6 +98,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -141,6 +141,6 @@
]
},
"generator": {
"engine": "bippy-4986f5686161"
"engine": "bippy-a5840b7849dd"
}
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-30309",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2023-30309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "An issue discovered in D-Link DI-7003GV2 routers allows attackers to hijack TCP sessions which could lead to a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/",
"url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/"
}
]
}

View File

@ -1,17 +1,71 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-35583",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2024-35583",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A cross-site scripting (XSS) vulnerability in Sourcecodester Laboratory Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Remarks input field."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://portswigger.net/web-security/cross-site-scripting/stored",
"refsource": "MISC",
"name": "https://portswigger.net/web-security/cross-site-scripting/stored"
},
{
"url": "https://owasp.org/www-community/attacks/xss/",
"refsource": "MISC",
"name": "https://owasp.org/www-community/attacks/xss/"
},
{
"refsource": "MISC",
"name": "https://github.com/r04i7/CVE/blob/main/CVE-2024-35583.md",
"url": "https://github.com/r04i7/CVE/blob/main/CVE-2024-35583.md"
}
]
}